An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Ankur O. BangUdai Pratap RaoAndrea ViscontiAlessandro BrighenteMauro ContiPublished in: Comput. Secur. (2022)
Keyphrases
- communication technologies
- management system
- security flaws
- security problems
- cloud computing
- security mechanisms
- security protocols
- countermeasures
- big data
- ubiquitous computing
- globally distributed
- security risks
- security vulnerabilities
- buffer overflow
- key management
- cryptographic protocols
- location information
- security issues
- rapid development
- wireless communication
- artificial intelligence
- supply chain
- computational power
- lead time
- authentication protocol
- embedded systems
- everyday objects
- information security
- smart card